BestEdrOfTheMarket - Little AV/EDR Bypassing Lab For Training And Learning Purposes


Little AV/EDR Evasion Lab for training & learning purposes. (️ under construction..)​

 ____            _     _____ ____  ____     ___   __   _____ _| __ )  ___  ___| |_  | ____|  _ \|  _ \   / _ \ / _| |_   _| |__   ___|  _ \ / _ \/ __| __| |  _| | | | | |_) | | | | | |_    | | | '_ \ / _ \| |_) |  __/\__ \ |_  | |___| |_| |  _ <  | |_| |  _|   | | | | | |  __/|____/_\___||___/\__| |_____|____/|_| \_\  \___/|_|     |_| |_| |_|\___||  \/  | __ _ _ __| | _____| |_| |\/| |/ _` | '__| |/ / _ \ __|| |  | | (_| | |  |   <  __/ |_           Yazidou - github.com/Xacone|_|  |_|\__,_|_|  |_|\_\___|\__|


BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding and bypassing EDR's user-mode detection methods that are frequently used by these security solutions.
These techniques are mainly based on a dynamic analysis of the target process state (memory, API calls, etc.),

Feel free to check this short article I wrote that describe the interception and analysis methods implemented by the EDR.


Defensive Techniques

In progress:


Usage

        Usage: BestEdrOfTheMarket.exe [args]                 /help Shows this help message and quit                 /v Verbosity                                  /iat IAT hooking                 /stack Threads call stack monitoring                 /nt Inline Nt-level hooking                 /k32 Inline Kernel32/Kernelbase hooking                 /ssn SSN crushing
BestEdrOfTheMarket.exe /stack /v /k32BestEdrOfTheMarket.exe /stack /ntBestEdrOfTheMarket.exe /iat



Via: www.kitploit.com
BestEdrOfTheMarket - Little AV/EDR Bypassing Lab For Training And Learning Purposes BestEdrOfTheMarket - Little AV/EDR Bypassing Lab For Training And Learning Purposes Reviewed by Zion3R on 18:42 Rating: 5